code-review-checklist

提供面向代码与方案的结构化评审框架,覆盖实施前的计划质量评估及实施后的安全、性能与架构合规性检查,通过分级缺陷记录确保软件交付的正确性、可维护性与系统一致性。

快捷安装

在终端运行此命令,即可一键安装该 Skill 到您的 Claude 中

npx skills add groupzer0/vs-code-agents --skill "code-review-checklist"

Code Review Checklist

Systematic review criteria for evaluating code and plans. Use this skill when:

  • Critic reviews plans before implementation
  • Security agent conducts code audits
  • Architect reviews architectural compliance
  • UAT validates implementation quality

Review Context

This skill supports two review phases:

PhaseAgentFocusDocuments
Pre-ImplementationCriticPlan quality, clarity, completenessplanning/*.md
Post-ImplementationSecurity, ArchitectCode quality, security, architectureSource code

Pre-Implementation Review (Critic)

Value Statement Assessment (MUST START HERE)

CheckQuestionFinding Severity
PresenceDoes plan have clear value statement in user story format?CRITICAL if missing
ClarityIs “So that” outcome measurable or verifiable?HIGH if vague
AlignmentDoes value support Master Product Objective?CRITICAL if drift
DirectnessIs value delivered directly, not deferred?HIGH if deferred

Plan Completeness

CheckQuestionFinding Severity
ScopeAre boundaries clearly defined?MEDIUM
DeliverablesAre all deliverables listed with acceptance criteria?HIGH
DependenciesAre dependencies identified and sequenced?MEDIUM
RisksAre risks documented with mitigations?LOW
VersionIs semver bump specified with rationale?MEDIUM

Constraint Compliance

CheckQuestionFinding Severity
No CodeDoes plan avoid prescriptive code?LOW
No HowDoes plan focus on WHAT/WHY, not HOW?LOW
ArchitectureDoes plan respect architectural constraints?HIGH

Post-Implementation Review (Security/Architect)

Security Checklist

CategoryCheckSeverity
Input ValidationAll user input validated server-side?CRITICAL
AuthenticationAuth checks on all protected routes?CRITICAL
AuthorizationRBAC/ownership verified before access?CRITICAL
SecretsNo hardcoded credentials or keys?CRITICAL
SQL/InjectionParameterized queries used?CRITICAL
XSSOutput encoding applied?HIGH
CSRFTokens on state-changing requests?HIGH
LoggingSecurity events logged without sensitive data?MEDIUM
DependenciesNo known CVEs in dependencies?Varies

Performance Checklist

CategoryCheckSeverity
N+1 QueriesBatch fetches instead of loops?HIGH
PaginationLarge datasets paginated?HIGH
CachingAppropriate caching strategy?MEDIUM
AsyncLong operations non-blocking?MEDIUM
Resource LimitsBounded allocations?HIGH

Maintainability Checklist

CategoryCheckSeverity
NamingClear, descriptive names?LOW
ComplexityCyclomatic complexity < 10?MEDIUM
CouplingLow coupling between modules?MEDIUM
DocumentationPublic APIs documented?LOW
Error HandlingErrors handled, not swallowed?HIGH
TestsAdequate coverage for changes?HIGH

Architectural Compliance

CategoryCheckSeverity
BoundariesModule boundaries respected?HIGH
PatternsEstablished patterns followed?MEDIUM
DependenciesDependency direction correct?HIGH
Single ResponsibilityClasses/modules focused?MEDIUM

Severity Definitions

SeverityResponseExamples
CRITICALBlock until fixedAuth bypass, SQL injection, no value statement
HIGHFix before mergeMissing validation, N+1 queries, unclear scope
MEDIUMFix in current cycleCode smells, missing docs, minor coupling
LOWTrack for laterStyle issues, optimization opportunities

Finding Format

Document findings consistently:

### [ID]: [Brief Title]
- **Severity**: CRITICAL / HIGH / MEDIUM / LOW
- **Status**: OPEN / ADDRESSED / RESOLVED / DEFERRED
- **Location**: [file:line or plan section]
- **Description**: [What is the issue?]
- **Impact**: [Why does this matter?]
- **Recommendation**: [How to fix?]

Agent-Specific Guidance

For Critic Agent

  • Focus on plan quality, not implementation details
  • Value statement assessment is mandatory first step
  • Reference Planner constraints when reviewing
  • Create critique in agent-output/critiques/

For Security Agent

  • Focus on OWASP Top 10 and injection patterns
  • Reference security-patterns skill for detection
  • Create audit in agent-output/security/
  • Use CVSS-aligned severity

For Architect Agent

  • Focus on system-level design compliance
  • Reference architecture-patterns skill
  • Update system-architecture.md when issues found
  • Include ADR updates if decisions affected